Sites down/infected
-
Greetings all! Pardon my ignorance on a lot of this, web development isn’t really my thing, but I try.
I have two sites that have been knocked completely off-line, the one mentioned and That’s Good Enough For Me.
Bluehost ran a scan for me, indicating 7 infected files, all of which are some 500.php file./home2/twdcstud/public_html/glossolalia/500.php: SL-PHP-EVAL_REQUEST-axog.UNOFFICIAL FOUND
/home2/twdcstud/public_html/500.php: SL-PHP-EVAL_REQUEST-axog.UNOFFICIAL FOUND
/home2/twdcstud/public_html/test/500.php: SL-PHP-EVAL_REQUEST-axog.UNOFFICIAL FOUND
/home2/twdcstud/public_html/tbd/500.php: SL-PHP-EVAL_REQUEST-axog.UNOFFICIAL FOUND
/home2/twdcstud/public_html/co-op/500.php: SL-PHP-EVAL_REQUEST-axog.UNOFFICIAL FOUND
/home2/twdcstud/public_html/comics/500.php: SL-PHP-EVAL_REQUEST-axog.UNOFFICIAL FOUND
/home2/twdcstud/public_html/co-op-forum/500.php: SL-PHP-EVAL_REQUEST-axog.UNOFFICIAL FOUND ----------- SCAN SUMMARY -----------
Known viruses: 2263445
Engine version: devel-clamav-0.99-beta1-632-g8a582c7
Scanned directories: 12535
Scanned files: 188378
Infected files: 7
Data scanned: 8604.30 MB
Data read: 16902.96 MB (ratio 0.51:1)
Time: 9355.212 sec (155 m 55 s) ----------- SCAN SUMMARY -----------
Known viruses: 2263445
Engine version: devel-clamav-0.99-beta1-632-g8a582c7
Scanned directories: 0
Scanned files: 0
Infected files: 0
Data scanned: 0.00 MB
Data read: 0.00 MB (ratio 0.00:1)
Time: 9.061 sec (0 m 9 s) ----------- SCAN SUMMARY -----------
Known viruses: 2263445
Engine version: devel-clamav-0.99-beta1-632-g8a582c7
Scanned directories: 0
Scanned files: 570
Infected files: 0
Data scanned: 0.00 MB
Data read: 0.00 MB (ratio 0.00:1)
Time: 11.584 sec (0 m 11 s)Each of those 500.php files have the same content:
<!-- PHP Wrapper - 500 Server Error --> <html><head><title>500 Server Error</title></head> <body bgcolor=white> <h1>500 Server Error</h1> A misconfiguration on the server caused a hiccup. Check the server logs, fix the problem, then try again. <hr> <? echo "URL: https://$_SERVER[HTTP_HOST]$_SERVER[REQUEST_URI]<br>\n"; $fixer = "checksuexec ".escapeshellarg($_SERVER[DOCUMENT_ROOT].$_SERVER[REQUEST_URI]); echo
$fixer
; ?> </body></html>I’ve read through the FAQ My site was hacked page, but am still a bit unclear on how to proceed.
Do I delete these 500.php files?
Any help or advice is greatly appreciated.The page I need help with: [log in to see the link]
Viewing 4 replies - 1 through 4 (of 4 total)
Viewing 4 replies - 1 through 4 (of 4 total)
- The topic ‘Sites down/infected’ is closed to new replies.